Bug 1965445

Summary: SHA-1 CAs are rejected even if they are explicitly trusted
Product: Red Hat Enterprise Linux 8 Reporter: Alexander Sosedkin <asosedki>
Component: gnutlsAssignee: Daiki Ueno <dueno>
Status: CLOSED ERRATA QA Contact: Alexander Sosedkin <asosedki>
Severity: unspecified Docs Contact: Mirek Jahoda <mjahoda>
Priority: medium    
Version: 8.5Keywords: Triaged
Target Milestone: beta   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: gnutls-3.6.16-3.el8 Doc Type: Bug Fix
Doc Text:
.`GnuTLS` no longer rejects SHA-1-signed CAs if they are explicitly trusted Previously, the `GnuTLS` library checked signature hash strength of all certificate authorities (CA) even if the CA was explicitly trusted. As a consequence, chains containing CAs signed with the SHA-1 algorithm were rejected with the error message `certificate's signature hash strength is unacceptable`. With this update, `GnuTLS` excludes trusted CAs from the signature hash strength checks and therefore no longer rejects certificate chains containing CAs even if they are signed using weak algorithms.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-09 19:50:01 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1956783    
Bug Blocks:    

Comment 12 errata-xmlrpc 2021-11-09 19:50:01 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: gnutls and nettle security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4451